These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

208 related articles for article (PubMed ID: 29495291)

  • 1. Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems.
    He X; Yang X; Yu W; Lin J; Yang Q
    Sensors (Basel); 2018 Feb; 18(2):. PubMed ID: 29495291
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Game Theoretic Honeypot Deployment in Smart Grid.
    Diamantoulakis P; Dalamagkas C; Radoglou-Grammatikis P; Sarigiannidis P; Karagiannidis G
    Sensors (Basel); 2020 Jul; 20(15):. PubMed ID: 32731595
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Zero-Determinant Strategies in Iterated Public Goods Game.
    Pan L; Hao D; Rong Z; Zhou T
    Sci Rep; 2015 Aug; 5():13096. PubMed ID: 26293589
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber-Physical Systems from Cyber Attacks.
    Wang W; Di Maio F; Zio E
    Risk Anal; 2019 Dec; 39(12):2766-2785. PubMed ID: 31361041
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Learning-Based Solution for an Adversarial Repeated Game in Cyber-Physical Power Systems.
    Paul S; Ni Z; Mu C
    IEEE Trans Neural Netw Learn Syst; 2020 Nov; 31(11):4512-4523. PubMed ID: 31899439
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Cyber Security: Effects of Penalizing Defenders in Cyber-Security Games via Experimentation and Computational Modeling.
    Maqbool Z; Aggarwal P; Pammi VSC; Dutt V
    Front Psychol; 2020; 11():11. PubMed ID: 32063872
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Multistage Attack-Defense Graph Game Analysis for Protection Resources Allocation Optimization Against Cyber Attacks Considering Rationality Evolution.
    Shao C; Li YF
    Risk Anal; 2022 May; 42(5):1086-1105. PubMed ID: 34636067
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution.
    Ni Z; Paul S
    IEEE Trans Neural Netw Learn Syst; 2019 Sep; 30(9):2684-2695. PubMed ID: 30624227
    [TBL] [Abstract][Full Text] [Related]  

  • 9. GridAttackAnalyzer: A Cyber Attack Analysis Framework for Smart Grids.
    Le TD; Ge M; Anwar A; Loke SW; Beuran R; Doss R; Tan Y
    Sensors (Basel); 2022 Jun; 22(13):. PubMed ID: 35808292
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Distributed Learning Based Joint Communication and Computation Strategy of IoT Devices in Smart Cities.
    Liu T; Luo R; Xu F; Fan C; Zhao C
    Sensors (Basel); 2020 Feb; 20(4):. PubMed ID: 32059343
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Stackelberg Dynamic Game-Based Resource Allocation in Threat Defense for Internet of Things.
    Liu B; Xu H; Zhou X
    Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30469434
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Internet of Things: Evolution, Concerns and Security Challenges.
    Malhotra P; Singh Y; Anand P; Bangotra DK; Singh PK; Hong WC
    Sensors (Basel); 2021 Mar; 21(5):. PubMed ID: 33807724
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Detection Games under Fully Active Adversaries.
    Tondi B; Merhav N; Barni M
    Entropy (Basel); 2018 Dec; 21(1):. PubMed ID: 33266739
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Towards a Low-Cost Remote Memory Attestation for the Smart Grid.
    Yang X; He X; Yu W; Lin J; Li R; Yang Q; Song H
    Sensors (Basel); 2015 Aug; 15(8):20799-824. PubMed ID: 26307998
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A Game-Theoretical Model to Improve Process Plant Protection from Terrorist Attacks.
    Zhang L; Reniers G
    Risk Anal; 2016 Dec; 36(12):2285-2297. PubMed ID: 26890089
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Autocratic strategies for iterated games with arbitrary action spaces.
    McAvoy A; Hauert C
    Proc Natl Acad Sci U S A; 2016 Mar; 113(13):3573-8. PubMed ID: 26976578
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Single equalizer strategy with no information transfer for conflict escalation.
    Engel A; Feigel A
    Phys Rev E; 2018 Jul; 98(1-1):012415. PubMed ID: 30110774
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Social Collective Attack Model and Procedures for Large-Scale Cyber-Physical Systems.
    Zhu P; Xun P; Hu Y; Xiong Y
    Sensors (Basel); 2021 Feb; 21(3):. PubMed ID: 33540605
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.
    Ali B; Awad AI
    Sensors (Basel); 2018 Mar; 18(3):. PubMed ID: 29518023
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Self-organization in a simple model of adaptive agents playing 2 x 2 games with arbitrary payoff matrices.
    Fort H; Viola S
    Phys Rev E Stat Nonlin Soft Matter Phys; 2004 Mar; 69(3 Pt 2):036110. PubMed ID: 15089364
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 11.